Executive Summary

Summary
Title openjdk-6 security update
Informations
Name DSA-2356 First vendor Publication 2011-12-01
Vendor Debian Last vendor Modification 2011-12-01
Severity (Vendor) N/A Revision 1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Several vulnerabilities have been discovered in OpenJDK, an implementation of the Java platform:

CVE-2011-3389 The TLS implementation does not guard properly against certain chosen-plaintext attacks when block ciphers are used in CBC mode.

CVE-2011-3521 The CORBA implementation contains a deserialization vulnerability in the IIOP implementation, allowing untrusted Java code (such as applets) to elevate its privileges.

CVE-2011-3544 The Java scripting engine lacks necessary security manager checks, allowing untrusted Java code (such as applets) to elevate its privileges.

CVE-2011-3547 The skip() method in java.io.InputStream uses a shared buffer, allowing untrusted Java code (such as applets) to access data that is skipped by other code.

CVE-2011-3548 The java.awt.AWTKeyStroke class contains a flaw which allows untrusted Java code (such as applets) to elevate its privileges.

CVE-2011-3551 The Java2D C code contains an integer overflow which results in a heap-based buffer overflow, potentially allowing untrusted Java code (such as applets) to elevate its privileges.

CVE-2011-3552 Malicous Java code can use up an excessive amount of UDP ports, leading to a denial of service.

CVE-2011-3553 JAX-WS enables stack traces for certain server responses by default, potentially leaking sensitive information.

CVE-2011-3554 JAR files in pack200 format are not properly checked for errors, potentially leading to arbitrary code execution when unpacking crafted pack200 files.

CVE-2011-3556 The RMI Registry server lacks access restrictions on certain methods, allowing a remote client to execute arbitary code.

CVE-2011-3557 The RMI Registry server fails to properly restrict privileges of untrusted Java code, allowing RMI clients to elevate their privileges on the RMI Registry server.

CVE-2011-3560 The com.sun.net.ssl.HttpsURLConnection class does not perform proper security manager checks in the setSSLSocketFactory() method, allowing untrusted Java code to bypass security policy restrictions.

For the stable distribution (squeeze), this problem has been fixed in version 6b18-1.8.10-0+squeeze1.

For the testing distribution (wheezy) and the unstable distribution (sid), this problem has been fixed in version 6b23~pre11-1.

We recommend that you upgrade your openjdk-6 packages.

Original Source

Url : http://www.debian.org/security/2011/dsa-2356

CWE : Common Weakness Enumeration

idName
CWE-20Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:19673
 
Oval ID: oval:org.mitre.oval:def:19673
Title: HP-UX Running Java JRE and JDK, Remote Denial of Service (DoS), Unauthorized Modification and Disclosure of Information
Description: The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
Family: unix Class: vulnerability
Reference(s): CVE-2011-3389
Version: 6
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15241
 
Oval ID: oval:org.mitre.oval:def:15241
Title: DSA-2368-1 lighttpd -- multiple
Description: Several vulnerabilities have been discovered in lighttpd, a small and fast webserver with minimal memory footprint. CVE-2011-4362 Xi Wang discovered that the base64 decoding routine which is used to decode user input during an HTTP authentication, suffers of a signedness issue when processing user input. As a result it is possible to force lighttpd to perform an out-of-bounds read which results in Denial of Service conditions. CVE-2011-3389 When using CBC ciphers on an SSL enabled virtual host to communicate with certain client, a so called "BEAST" attack allows man-in-the-middle attackers to obtain plaintext HTTP traffic via a blockwise chosen-boundary attack on an HTTPS session. Technically this is no lighttpd vulnerability. However, lighttpd offers a workaround to mitigate this problem by providing a possibility to disable CBC ciphers. This updates includes this option by default. System administrators are advised to read the NEWS file of this update.
Family: unix Class: patch
Reference(s): DSA-2368-1
CVE-2011-4362
CVE-2011-3389
Version: 7
Platform(s): Debian GNU/Linux 5.0
Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): lighttpd
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14752
 
Oval ID: oval:org.mitre.oval:def:14752
Title: SSL and TLS Protocols Vulnerability
Description: The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3389
Version: 7
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows 7
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19444
 
Oval ID: oval:org.mitre.oval:def:19444
Title: HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.
Family: unix Class: vulnerability
Reference(s): CVE-2011-3521
Version: 8
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13662
 
Oval ID: oval:org.mitre.oval:def:13662
Title: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3521
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): Java Runtime Environment
Java Development Kit
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19362
 
Oval ID: oval:org.mitre.oval:def:19362
Title: HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.
Family: unix Class: vulnerability
Reference(s): CVE-2011-3544
Version: 7
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13947
 
Oval ID: oval:org.mitre.oval:def:13947
Title: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3544
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): Java Runtime Environment
Java Development Kit
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19804
 
Oval ID: oval:org.mitre.oval:def:19804
Title: HP-UX Running Java JRE and JDK, Remote Denial of Service (DoS), Unauthorized Modification and Disclosure of Information
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.
Family: unix Class: vulnerability
Reference(s): CVE-2011-3547
Version: 6
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14339
 
Oval ID: oval:org.mitre.oval:def:14339
Title: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3547
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): Java Development Kit
Java Runtime Environment
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19607
 
Oval ID: oval:org.mitre.oval:def:19607
Title: HP-UX Running Java JRE and JDK, Remote Denial of Service (DoS), Unauthorized Modification and Disclosure of Information
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.
Family: unix Class: vulnerability
Reference(s): CVE-2011-3548
Version: 6
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14492
 
Oval ID: oval:org.mitre.oval:def:14492
Title: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3548
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): Java Development Kit
Java Runtime Environment
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19719
 
Oval ID: oval:org.mitre.oval:def:19719
Title: HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
Family: unix Class: vulnerability
Reference(s): CVE-2011-3551
Version: 7
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14318
 
Oval ID: oval:org.mitre.oval:def:14318
Title: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3551
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): Java Runtime Environment
Java Development Kit
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19330
 
Oval ID: oval:org.mitre.oval:def:19330
Title: HP-UX Running Java JRE and JDK, Remote Denial of Service (DoS), Unauthorized Modification and Disclosure of Information
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.
Family: unix Class: vulnerability
Reference(s): CVE-2011-3552
Version: 6
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14465
 
Oval ID: oval:org.mitre.oval:def:14465
Title: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3552
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): Java Development Kit
Java Runtime Environment
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19683
 
Oval ID: oval:org.mitre.oval:def:19683
Title: HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.
Family: unix Class: vulnerability
Reference(s): CVE-2011-3553
Version: 7
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14311
 
Oval ID: oval:org.mitre.oval:def:14311
Title: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3553
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): Java Runtime Environment
Java Development Kit
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19795
 
Oval ID: oval:org.mitre.oval:def:19795
Title: HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.
Family: unix Class: vulnerability
Reference(s): CVE-2011-3554
Version: 7
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14524
 
Oval ID: oval:org.mitre.oval:def:14524
Title: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3554
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): Java Runtime Environment
Java Development Kit
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22116
 
Oval ID: oval:org.mitre.oval:def:22116
Title: RHSA-2011:1478: java-1.5.0-ibm security update (Critical)
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI.
Family: unix Class: patch
Reference(s): RHSA-2011:1478-01
CVE-2011-3545
CVE-2011-3547
CVE-2011-3548
CVE-2011-3549
CVE-2011-3552
CVE-2011-3554
CVE-2011-3556
Version: 94
Platform(s): Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 6
Product(s): java-1.5.0-ibm
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:18875
 
Oval ID: oval:org.mitre.oval:def:18875
Title: HP-UX Running Java JRE and JDK, Remote Denial of Service (DoS), Unauthorized Modification and Disclosure of Information
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI.
Family: unix Class: vulnerability
Reference(s): CVE-2011-3556
Version: 6
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14316
 
Oval ID: oval:org.mitre.oval:def:14316
Title: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI.
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3556
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): Java Development Kit
Java Runtime Environment
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23537
 
Oval ID: oval:org.mitre.oval:def:23537
Title: ELSA-2011:1478: java-1.5.0-ibm security update (Critical)
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI.
Family: unix Class: patch
Reference(s): ELSA-2011:1478-01
CVE-2011-3545
CVE-2011-3547
CVE-2011-3548
CVE-2011-3549
CVE-2011-3552
CVE-2011-3554
CVE-2011-3556
Version: 33
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): java-1.5.0-ibm
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23188
 
Oval ID: oval:org.mitre.oval:def:23188
Title: DEPRECATED: ELSA-2011:1478: java-1.5.0-ibm security update (Critical)
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI.
Family: unix Class: patch
Reference(s): ELSA-2011:1478-01
CVE-2011-3545
CVE-2011-3547
CVE-2011-3548
CVE-2011-3549
CVE-2011-3552
CVE-2011-3554
CVE-2011-3556
Version: 34
Platform(s): Oracle Linux 5
Oracle Linux 6
Product(s): java-1.5.0-ibm
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19574
 
Oval ID: oval:org.mitre.oval:def:19574
Title: HP-UX Running Java JRE and JDK, Remote Denial of Service (DoS), Unauthorized Modification and Disclosure of Information
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI.
Family: unix Class: vulnerability
Reference(s): CVE-2011-3557
Version: 6
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14373
 
Oval ID: oval:org.mitre.oval:def:14373
Title: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI.
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3557
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): Java Development Kit
Java Runtime Environment
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21558
 
Oval ID: oval:org.mitre.oval:def:21558
Title: RHSA-2011:1380: java-1.6.0-openjdk security update (Critical)
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.
Family: unix Class: patch
Reference(s): RHSA-2011:1380-01
CESA-2011:1380
CVE-2011-3389
CVE-2011-3521
CVE-2011-3544
CVE-2011-3547
CVE-2011-3548
CVE-2011-3551
CVE-2011-3552
CVE-2011-3553
CVE-2011-3554
CVE-2011-3556
CVE-2011-3557
CVE-2011-3558
CVE-2011-3560
Version: 159
Platform(s): Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 5
CentOS Linux 5
CentOS Linux 6
Product(s): java-1.6.0-openjdk
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21364
 
Oval ID: oval:org.mitre.oval:def:21364
Title: RHSA-2012:0006: java-1.4.2-ibm security update (Critical)
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.
Family: unix Class: patch
Reference(s): RHSA-2012:0006-01
CVE-2011-3389
CVE-2011-3545
CVE-2011-3547
CVE-2011-3548
CVE-2011-3549
CVE-2011-3552
CVE-2011-3556
CVE-2011-3557
CVE-2011-3560
Version: 107
Platform(s): Red Hat Enterprise Linux 5
Product(s): java-1.4.2-ibm
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:19792
 
Oval ID: oval:org.mitre.oval:def:19792
Title: HP-UX Running Java JRE and JDK, Remote Denial of Service (DoS), Unauthorized Modification and Disclosure of Information
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.
Family: unix Class: vulnerability
Reference(s): CVE-2011-3560
Version: 6
Platform(s): HP-UX 11
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15374
 
Oval ID: oval:org.mitre.oval:def:15374
Title: DSA-2358-1 openjdk-6 -- several
Description: Several vulnerabilities have been discovered in OpenJDK, an implementation of the Java platform. This combines the two previous openjdk-6 advisories, DSA-2311-1 and DSA-2356-1. CVE-2011-0862 Integer overflow errors in the JPEG and font parser allow untrusted code to elevate its privileges. CVE-2011-0864 Hotspot, the just-in-time compiler in OpenJDK, mishandled certain byte code instructions, allowing untrusted code to crash the virtual machine. CVE-2011-0865 A race condition in signed object deserialization could allow untrusted code to modify signed content, apparently leaving its signature intact. CVE-2011-0867 Untrusted code could access information about network interfaces which was not intended to be public. CVE-2011-0868 A float-to-long conversion could overflow, allowing untrusted code to crash the virtual machine. CVE-2011-0869 Untrusted code could intercept HTTP requests by reconfiguring proxy settings through a SOAP connection. CVE-2011-0871 Untrusted code could elevate its privileges through the Swing MediaTracker code. CVE-2011-3389 The TLS implementation does not guard properly against certain chosen-plaintext attacks when block ciphers are used in CBC mode. CVE-2011-3521 The CORBA implementation contains a deserialization vulnerability in the IIOP implementation, allowing untrusted Java code to elevate its privileges. CVE-2011-3544 The Java scripting engine lacks necessary security manager checks, allowing untrusted Java code to elevate its privileges. CVE-2011-3547 The skip method in java.io.InputStream uses a shared buffer, allowing untrusted Java code to access data that is skipped by other code. CVE-2011-3548 The java.awt.AWTKeyStroke class contains a flaw which allows untrusted Java code to elevate its privileges. CVE-2011-3551 The Java2D C code contains an integer overflow which results in a heap-based buffer overflow, potentially allowing untrusted Java code to elevate its privileges. CVE-2011-3552 Malicous Java code can use up an excessive amount of UDP ports, leading to a denial of service. CVE-2011-3553 JAX-WS enables stack traces for certain server responses by default, potentially leaking sensitive information. CVE-2011-3554 JAR files in pack200 format are not properly checked for errors, potentially leading to arbitrary code execution when unpacking crafted pack200 files. CVE-2011-3556 The RMI Registry server lacks access restrictions on certain methods, allowing a remote client to execute arbitary code. CVE-2011-3557 The RMI Registry server fails to properly restrict privileges of untrusted Java code, allowing RMI clients to elevate their privileges on the RMI Registry server. CVE-2011-3560 The com.sun.net.ssl.HttpsURLConnection class does not perform proper security manager checks in the setSSLSocketFactory method, allowing untrusted Java code to bypass security policy restrictions.
Family: unix Class: patch
Reference(s): DSA-2358-1
CVE-2011-0862
CVE-2011-0864
CVE-2011-0865
CVE-2011-0867
CVE-2011-0868
CVE-2011-0869
CVE-2011-0871
CVE-2011-3389
CVE-2011-3521
CVE-2011-3544
CVE-2011-3547
CVE-2011-3548
CVE-2011-3551
CVE-2011-3552
CVE-2011-3553
CVE-2011-3554
CVE-2011-3556
CVE-2011-3557
CVE-2011-3560
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): openjdk-6
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15328
 
Oval ID: oval:org.mitre.oval:def:15328
Title: USN-1263-2 -- OpenJDK 6 regression
Description: openjdk-6: Open Source Java implementation - openjdk-6b18: Open Source Java implementation Details: USN-1263-1 fixed vulnerabilities in OpenJDK 6. The upstream patch for the chosen plaintext attack on the block-wise AES encryption algorithm introduced a regression that caused TLS/SSL connections to fail when using certain algorithms. This update fixes the problem. We apologize for the inconvenience. Original advisory USN-1263-1 caused a regression when using OpenJDK 6�s SSL/TLS implementation.
Family: unix Class: patch
Reference(s): USN-1263-2
CVE-2011-3389
CVE-2011-3377
CVE-2011-3521
CVE-2011-3544
CVE-2011-3547
CVE-2011-3548
CVE-2011-3551
CVE-2011-3552
CVE-2011-3553
CVE-2011-3554
CVE-2011-3556
CVE-2011-3557
CVE-2011-3558
CVE-2011-3560
Version: 5
Platform(s): Ubuntu 11.04
Ubuntu 11.10
Ubuntu 10.04
Ubuntu 10.10
Product(s): OpenJDK
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15316
 
Oval ID: oval:org.mitre.oval:def:15316
Title: USN-1263-1 -- IcedTea-Web, OpenJDK 6 vulnerabilities
Description: icedtea-web: A web browser plugin to execute Java applets - openjdk-6: Open Source Java implementation - openjdk-6b18: Open Source Java implementation Multiple OpenJDK 6 and IcedTea-Web vulnerabilities have been fixed.
Family: unix Class: patch
Reference(s): USN-1263-1
CVE-2011-3377
CVE-2011-3389
CVE-2011-3521
CVE-2011-3544
CVE-2011-3547
CVE-2011-3548
CVE-2011-3551
CVE-2011-3552
CVE-2011-3553
CVE-2011-3554
CVE-2011-3556
CVE-2011-3557
CVE-2011-3558
CVE-2011-3560
Version: 5
Platform(s): Ubuntu 11.04
Ubuntu 11.10
Ubuntu 10.04
Ubuntu 10.10
Product(s): IcedTea-Web
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15281
 
Oval ID: oval:org.mitre.oval:def:15281
Title: DSA-2356-1 openjdk-6 -- several
Description: Several vulnerabilities have been discovered in OpenJDK, an implementation of the Java platform: CVE-2011-3389 The TLS implementation does not guard properly against certain chosen-plaintext attacks when block ciphers are used in CBC mode. CVE-2011-3521 The CORBA implementation contains a deserialization vulnerability in the IIOP implementation, allowing untrusted Java code to elevate its privileges. CVE-2011-3544 The Java scripting engine lacks necessary security manager checks, allowing untrusted Java code to elevate its privileges. CVE-2011-3547 The skip method in java.io.InputStream uses a shared buffer, allowing untrusted Java code to access data that is skipped by other code. CVE-2011-3548 The java.awt.AWTKeyStroke class contains a flaw which allows untrusted Java code to elevate its privileges. CVE-2011-3551 The Java2D C code contains an integer overflow which results in a heap-based buffer overflow, potentially allowing untrusted Java code to elevate its privileges. CVE-2011-3552 Malicous Java code can use up an excessive amount of UDP ports, leading to a denial of service. CVE-2011-3553 JAX-WS enables stack traces for certain server responses by default, potentially leaking sensitive information. CVE-2011-3554 JAR files in pack200 format are not properly checked for errors, potentially leading to arbitrary code execution when unpacking crafted pack200 files. CVE-2011-3556 The RMI Registry server lacks access restrictions on certain methods, allowing a remote client to execute arbitary code. CVE-2011-3557 The RMI Registry server fails to properly restrict privileges of untrusted Java code, allowing RMI clients to elevate their privileges on the RMI Registry server. CVE-2011-3560 The com.sun.net.ssl.HttpsURLConnection class does not perform proper security manager checks in the setSSLSocketFactory method, allowing untrusted Java code to bypass security policy restrictions.
Family: unix Class: patch
Reference(s): DSA-2356-1
CVE-2011-3389
CVE-2011-3521
CVE-2011-3544
CVE-2011-3547
CVE-2011-3548
CVE-2011-3551
CVE-2011-3552
CVE-2011-3553
CVE-2011-3554
CVE-2011-3556
CVE-2011-3557
CVE-2011-3560
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): openjdk-6
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:14394
 
Oval ID: oval:org.mitre.oval:def:14394
Title: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.
Family: windows Class: vulnerability
Reference(s): CVE-2011-3560
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows 8
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Product(s): Java Development Kit
Java Runtime Environment
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23746
 
Oval ID: oval:org.mitre.oval:def:23746
Title: ELSA-2011:1380: java-1.6.0-openjdk security update (Critical)
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.
Family: unix Class: patch
Reference(s): ELSA-2011:1380-01
CVE-2011-3389
CVE-2011-3521
CVE-2011-3544
CVE-2011-3547
CVE-2011-3548
CVE-2011-3551
CVE-2011-3552
CVE-2011-3553
CVE-2011-3554
CVE-2011-3556
CVE-2011-3557
CVE-2011-3558
CVE-2011-3560
Version: 53
Platform(s): Oracle Linux 6
Oracle Linux 5
Product(s): java-1.6.0-openjdk
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23077
 
Oval ID: oval:org.mitre.oval:def:23077
Title: ELSA-2012:0006: java-1.4.2-ibm security update (Critical)
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.
Family: unix Class: patch
Reference(s): ELSA-2012:0006-01
CVE-2011-3389
CVE-2011-3545
CVE-2011-3547
CVE-2011-3548
CVE-2011-3549
CVE-2011-3552
CVE-2011-3556
CVE-2011-3557
CVE-2011-3560
Version: 37
Platform(s): Oracle Linux 5
Product(s): java-1.4.2-ibm
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22840
 
Oval ID: oval:org.mitre.oval:def:22840
Title: DEPRECATED: ELSA-2011:1380: java-1.6.0-openjdk security update (Critical)
Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.
Family: unix Class: patch
Reference(s): ELSA-2011:1380-01
CVE-2011-3389
CVE-2011-3521
CVE-2011-3544
CVE-2011-3547
CVE-2011-3548
CVE-2011-3551
CVE-2011-3552
CVE-2011-3553
CVE-2011-3554
CVE-2011-3556
CVE-2011-3557
CVE-2011-3558
CVE-2011-3560
Version: 54
Platform(s): Oracle Linux 6
Oracle Linux 5
Product(s): java-1.6.0-openjdk
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1
Application1
Application1
Application1
Application7
Application7
Application7
Application97
Application94
Os1

SAINT Exploits

DescriptionLink
Oracle Java Rhino Script Engine Code ExecutionMore info here

ExploitDB Exploits

idDescription
2011-11-30Java Applet Rhino Script Engine Remote Code Execution

OpenVAS Exploits

DateDescription
2012-10-19Name : Fedora Update for java-1.6.0-openjdk FEDORA-2012-16351
File : nvt/gb_fedora_2012_16351_java-1.6.0-openjdk_fc16.nasl
2012-10-19Name : Fedora Update for java-1.7.0-openjdk FEDORA-2012-16351
File : nvt/gb_fedora_2012_16351_java-1.7.0-openjdk_fc16.nasl
2012-09-25Name : Mac OS X v10.6.8 Multiple Vulnerabilities (2012-004)
File : nvt/gb_macosx_su12-004.nasl
2012-09-22Name : Fedora Update for java-1.6.0-openjdk FEDORA-2012-13127
File : nvt/gb_fedora_2012_13127_java-1.6.0-openjdk_fc16.nasl
2012-09-04Name : Mandriva Update for fetchmail MDVSA-2012:149 (fetchmail)
File : nvt/gb_mandriva_MDVSA_2012_149.nasl
2012-09-04Name : Fedora Update for java-1.7.0-openjdk FEDORA-2012-13138
File : nvt/gb_fedora_2012_13138_java-1.7.0-openjdk_fc16.nasl
2012-08-30Name : FreeBSD Ports: fetchmail
File : nvt/freebsd_fetchmail16.nasl
2012-08-30Name : Fedora Update for python3 FEDORA-2012-5785
File : nvt/gb_fedora_2012_5785_python3_fc17.nasl
2012-08-30Name : Fedora Update for python-docs FEDORA-2012-5892
File : nvt/gb_fedora_2012_5892_python-docs_fc17.nasl
2012-08-30Name : Fedora Update for python FEDORA-2012-5892
File : nvt/gb_fedora_2012_5892_python_fc17.nasl
2012-08-03Name : Mandriva Update for curl MDVSA-2012:058 (curl)
File : nvt/gb_mandriva_MDVSA_2012_058.nasl
2012-07-30Name : CentOS Update for firefox CESA-2012:1088 centos5
File : nvt/gb_CESA-2012_1088_firefox_centos5.nasl
2012-07-30Name : CentOS Update for firefox CESA-2012:1088 centos6
File : nvt/gb_CESA-2012_1088_firefox_centos6.nasl
2012-07-30Name : CentOS Update for thunderbird CESA-2012:1089 centos5
File : nvt/gb_CESA-2012_1089_thunderbird_centos5.nasl
2012-07-30Name : CentOS Update for thunderbird CESA-2012:1089 centos6
File : nvt/gb_CESA-2012_1089_thunderbird_centos6.nasl
2012-07-30Name : CentOS Update for java CESA-2011:1380 centos5 x86_64
File : nvt/gb_CESA-2011_1380_java_centos5_x86_64.nasl
2012-07-19Name : RedHat Update for firefox RHSA-2012:1088-01
File : nvt/gb_RHSA-2012_1088-01_firefox.nasl
2012-07-19Name : RedHat Update for thunderbird RHSA-2012:1089-01
File : nvt/gb_RHSA-2012_1089-01_thunderbird.nasl
2012-06-22Name : Mandriva Update for python MDVSA-2012:096 (python)
File : nvt/gb_mandriva_MDVSA_2012_096.nasl
2012-06-22Name : Mandriva Update for python MDVSA-2012:097 (python)
File : nvt/gb_mandriva_MDVSA_2012_097.nasl
2012-06-22Name : Fedora Update for python3 FEDORA-2012-9135
File : nvt/gb_fedora_2012_9135_python3_fc16.nasl
2012-06-19Name : Fedora Update for java-1.6.0-openjdk FEDORA-2012-9541
File : nvt/gb_fedora_2012_9541_java-1.6.0-openjdk_fc15.nasl
2012-06-19Name : Fedora Update for java-1.6.0-openjdk FEDORA-2012-9545
File : nvt/gb_fedora_2012_9545_java-1.6.0-openjdk_fc16.nasl
2012-06-19Name : Fedora Update for java-1.7.0-openjdk FEDORA-2012-9593
File : nvt/gb_fedora_2012_9593_java-1.7.0-openjdk_fc16.nasl
2012-05-18Name : Mac OS X Multiple Vulnerabilities (2012-002)
File : nvt/gb_macosx_su12-002.nasl
2012-05-08Name : Fedora Update for python-docs FEDORA-2012-5924
File : nvt/gb_fedora_2012_5924_python-docs_fc16.nasl
2012-05-08Name : Fedora Update for python FEDORA-2012-5924
File : nvt/gb_fedora_2012_5924_python_fc16.nasl
2012-05-04Name : Fedora Update for python3 FEDORA-2012-5916
File : nvt/gb_fedora_2012_5916_python3_fc15.nasl
2012-04-30Name : Debian Security Advisory DSA 2398-2 (curl)
File : nvt/deb_2398_2.nasl
2012-04-06Name : Opera Extended Validation Information Disclosure Vulnerabilities (Linux)
File : nvt/gb_opera_extented_validation_info_disc_vuln_lin.nasl
2012-04-02Name : Fedora Update for firefox FEDORA-2011-17400
File : nvt/gb_fedora_2011_17400_firefox_fc16.nasl
2012-04-02Name : Fedora Update for nss-softokn FEDORA-2011-17400
File : nvt/gb_fedora_2011_17400_nss-softokn_fc16.nasl
2012-04-02Name : Fedora Update for nss-util FEDORA-2011-17400
File : nvt/gb_fedora_2011_17400_nss-util_fc16.nasl
2012-04-02Name : Fedora Update for thunderbird-lightning FEDORA-2011-17400
File : nvt/gb_fedora_2011_17400_thunderbird-lightning_fc16.nasl
2012-04-02Name : Fedora Update for thunderbird FEDORA-2011-17400
File : nvt/gb_fedora_2011_17400_thunderbird_fc16.nasl
2012-04-02Name : Fedora Update for xulrunner FEDORA-2011-17400
File : nvt/gb_fedora_2011_17400_xulrunner_fc16.nasl
2012-04-02Name : Fedora Update for java-1.7.0-openjdk FEDORA-2012-1690
File : nvt/gb_fedora_2012_1690_java-1.7.0-openjdk_fc16.nasl
2012-04-02Name : Fedora Update for java-1.6.0-openjdk FEDORA-2012-1711
File : nvt/gb_fedora_2012_1711_java-1.6.0-openjdk_fc16.nasl
2012-04-02Name : Fedora Update for java-1.6.0-openjdk FEDORA-2011-15020
File : nvt/gb_fedora_2011_15020_java-1.6.0-openjdk_fc16.nasl
2012-03-19Name : Fedora Update for nss FEDORA-2011-17400
File : nvt/gb_fedora_2011_17400_nss_fc16.nasl
2012-03-19Name : Fedora Update for java-1.7.0-openjdk FEDORA-2011-15555
File : nvt/gb_fedora_2011_15555_java-1.7.0-openjdk_fc16.nasl
2012-03-12Name : Gentoo Security Advisory GLSA 201203-02 (cURL)
File : nvt/glsa_201203_02.nasl
2012-03-09Name : Fedora Update for java-1.6.0-openjdk FEDORA-2012-1721
File : nvt/gb_fedora_2012_1721_java-1.6.0-openjdk_fc15.nasl
2012-02-12Name : Debian Security Advisory DSA 2398-1 (curl)
File : nvt/deb_2398_1.nasl
2012-02-12Name : Gentoo Security Advisory GLSA 201111-02 (sun-jre-bin sun-jdk emul-linux-x86-j...
File : nvt/glsa_201111_02.nasl
2012-02-11Name : Debian Security Advisory DSA 2356-1 (openjdk-6)
File : nvt/deb_2356_1.nasl
2012-02-11Name : Debian Security Advisory DSA 2358-1 (openjdk-6)
File : nvt/deb_2358_1.nasl
2012-02-11Name : Debian Security Advisory DSA 2368-1 (lighttpd)
File : nvt/deb_2368_1.nasl
2012-02-06Name : Mac OS X Multiple Vulnerabilities (2012-001)
File : nvt/gb_macosx_su12-001.nasl
2012-01-25Name : Ubuntu Update for openjdk-6 USN-1263-2
File : nvt/gb_ubuntu_USN_1263_2.nasl
2012-01-23Name : Fedora Update for nss FEDORA-2011-17399
File : nvt/gb_fedora_2011_17399_nss_fc15.nasl
2012-01-23Name : Fedora Update for perl-Gtk2-MozEmbed FEDORA-2011-17399
File : nvt/gb_fedora_2011_17399_perl-Gtk2-MozEmbed_fc15.nasl
2012-01-23Name : Fedora Update for thunderbird-lightning FEDORA-2011-17399
File : nvt/gb_fedora_2011_17399_thunderbird-lightning_fc15.nasl
2012-01-23Name : Fedora Update for thunderbird FEDORA-2011-17399
File : nvt/gb_fedora_2011_17399_thunderbird_fc15.nasl
2012-01-23Name : Fedora Update for xulrunner FEDORA-2011-17399
File : nvt/gb_fedora_2011_17399_xulrunner_fc15.nasl
2012-01-23Name : Fedora Update for firefox FEDORA-2011-17399
File : nvt/gb_fedora_2011_17399_firefox_fc15.nasl
2012-01-23Name : Fedora Update for gnome-python2-extras FEDORA-2011-17399
File : nvt/gb_fedora_2011_17399_gnome-python2-extras_fc15.nasl
2012-01-23Name : Fedora Update for nspr FEDORA-2011-17399
File : nvt/gb_fedora_2011_17399_nspr_fc15.nasl
2012-01-23Name : Fedora Update for nss-softokn FEDORA-2011-17399
File : nvt/gb_fedora_2011_17399_nss-softokn_fc15.nasl
2012-01-23Name : Fedora Update for nss-util FEDORA-2011-17399
File : nvt/gb_fedora_2011_17399_nss-util_fc15.nasl
2012-01-11Name : Microsoft Windows SSL/TLS Information Disclosure Vulnerability (2643584)
File : nvt/secpod_ms12-006.nasl
2011-11-18Name : Ubuntu Update for icedtea-web USN-1263-1
File : nvt/gb_ubuntu_USN_1263_1.nasl
2011-11-15Name : Oracle Java SE Multiple Vulnerabilities - October 2011 (Windows01)
File : nvt/gb_oracle_java_se_mult_vuln_oct11_win_01.nasl
2011-11-15Name : Oracle Java SE Multiple Vulnerabilities - October 2011 (Windows02)
File : nvt/gb_oracle_java_se_mult_vuln_oct11_win_02.nasl
2011-11-15Name : Oracle Java SE Multiple Vulnerabilities - October 2011 (Windows04)
File : nvt/gb_oracle_java_se_mult_vuln_oct11_win_04.nasl
2011-11-14Name : Mandriva Update for java-1.6.0-openjdk MDVSA-2011:170 (java-1.6.0-openjdk)
File : nvt/gb_mandriva_MDVSA_2011_170.nasl
2011-10-21Name : RedHat Update for java-1.6.0-openjdk RHSA-2011:1380-01
File : nvt/gb_RHSA-2011_1380-01_java-1.6.0-openjdk.nasl
2011-10-21Name : CentOS Update for java CESA-2011:1380 centos5 i386
File : nvt/gb_CESA-2011_1380_java_centos5_i386.nasl
2011-10-21Name : Fedora Update for java-1.6.0-openjdk FEDORA-2011-14638
File : nvt/gb_fedora_2011_14638_java-1.6.0-openjdk_fc14.nasl
2011-10-21Name : Fedora Update for java-1.6.0-openjdk FEDORA-2011-14648
File : nvt/gb_fedora_2011_14648_java-1.6.0-openjdk_fc15.nasl
2011-09-09Name : Opera Extended Validation Information Disclosure Vulnerabilities (Mac OS X)
File : nvt/gb_opera_extented_validation_info_disc_vuln_macosx.nasl
2011-09-09Name : Opera Extended Validation Information Disclosure Vulnerabilities (Windows)
File : nvt/gb_opera_extented_validation_info_disc_vuln_win.nasl
0000-00-00Name : Java for Mac OS X 10.6 Update 6 And 10.7 Update 1
File : nvt/secpod_macosx_java_10_6_upd_6_and_10_7_upd_1.nasl
0000-00-00Name : FreeBSD Ports: opera, linux-opera
File : nvt/freebsd_opera25.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
76512Oracle Java SE JRE JAXWS Component Unspecified Remote Information Disclosure
76511Oracle Java SE JRE Networking Component Unspecified Remote Information Disclo...
76507Oracle Java SE JRE JSSE Component Unspecified Remote Issue
76506Oracle Java SE JRE RMI Component Unspecified Remote Issue (2011-3557)
76505Oracle Java SE JRE RMI Component Unspecified Remote Issue (2011-3556)
76502Oracle Java SE JRE 2D Component Unspecified Remote Issue
76500Oracle Java SE JRE Rhino Javascript Error Parsing Input Sanitation Weakness R...
76498Oracle Java SE JRE Component Unspecified Remote Issue (2011-3554)
76497Oracle Java SE JRE Networking Component java.net.Socket API UDP Socket Satura...
76496Oracle Java SE JRE IIOP Deserialization Applet Handling Remote Code Execution
76495Oracle Java SE JRE AWT Component Unspecified Remote Issue (2011-3548)
74829SSL Chained Initialization Vector CBC Mode MiTM Weakness

Information Assurance Vulnerability Management (IAVM)

DateDescription
2014-02-27IAVM : 2014-A-0030 - Apple Mac OS X Security Update 2014-001
Severity : Category I - VMSKEY : V0044547
2013-10-17IAVM : 2013-A-0199 - Multiple Vulnerabilities in Oracle Fusion Middleware
Severity : Category I - VMSKEY : V0040786
2012-05-03IAVM : 2012-B-0048 - Multiple Vulnerabilities in HP Systems Insight Manager
Severity : Category I - VMSKEY : V0032178
2012-03-29IAVM : 2012-A-0048 - Multiple Vulnerabilities in VMware vCenter Update Manager 5.0
Severity : Category I - VMSKEY : V0031901
2012-01-13IAVM : 2012-B-0006 - Microsoft SSL/TLS Information Disclosure Vulnerability
Severity : Category I - VMSKEY : V0031054

Snort® IPS/IDS

DateDescription
2014-03-06Oracle Java Rhino script engine remote code execution attempt
RuleID : 29535 - Revision : 1 - Type : FILE-JAVA
2014-02-21Styx exploit kit eot outbound connection
RuleID : 29453 - Revision : 1 - Type : EXPLOIT-KIT
2014-02-21Styx exploit kit landing page request
RuleID : 29452 - Revision : 1 - Type : EXPLOIT-KIT
2014-02-21Styx exploit kit outbound jar request
RuleID : 29451 - Revision : 2 - Type : EXPLOIT-KIT
2014-02-21Styx exploit kit outbound connection attempt
RuleID : 29450 - Revision : 1 - Type : EXPLOIT-KIT
2014-02-21Styx exploit kit landing page
RuleID : 29449 - Revision : 1 - Type : EXPLOIT-KIT
2014-02-21Styx exploit kit landing page
RuleID : 29448 - Revision : 1 - Type : EXPLOIT-KIT
2014-02-21Styx exploit kit jar outbound connection
RuleID : 29446 - Revision : 2 - Type : EXPLOIT-KIT
2014-02-21Styx exploit kit fonts download page
RuleID : 29445 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-30Stamp exploit kit PDF exploit retrieval attempt
RuleID : 29131 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-30Stamp exploit kit malicious payload download attempt
RuleID : 29130 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-30Stamp exploit kit jar exploit download - specific structure
RuleID : 29129 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-30Stamp exploit kit plugin detection page
RuleID : 29128 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit landing page request
RuleID : 28478 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit outbound pdf request
RuleID : 28477 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Himan exploit kit payload - Oracle Java compromise
RuleID : 28310 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Himan exploit kit landing page
RuleID : 28307 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - readme.dll
RuleID : 27898 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - calc.dll
RuleID : 27897 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - contacts.dll
RuleID : 27896 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - info.dll
RuleID : 27895 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - about.dll
RuleID : 27894 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit malicious redirection attempt
RuleID : 27815 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit landing page request
RuleID : 27814 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit landing page with payload
RuleID : 27813 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Gong Da exploit kit possible jar download
RuleID : 27706 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Gong Da exploit kit Java exploit requested
RuleID : 27705 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Gong Da exploit kit Java exploit requested
RuleID : 27704 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Gong Da exploit kit plugin detection
RuleID : 27703 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Gong Da exploit kit landing page
RuleID : 27702 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Gong Da Jar file download
RuleID : 27701 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10iFramer toolkit injected iframe detected - specific structure
RuleID : 27271 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Private exploit kit outbound traffic
RuleID : 27144-community - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Private exploit kit outbound traffic
RuleID : 27144 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Private exploit kit landing page
RuleID : 27143 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Private exploit kit landing page
RuleID : 27142 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Private exploit kit landing page
RuleID : 27141 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Private exploit kit numerically named exe file dowload
RuleID : 27140 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Nailed exploit kit rhino remote code execution exploit download - autopwn
RuleID : 27084 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page retrieval
RuleID : 27072 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page retrieval
RuleID : 27071 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit plugin detection connection jovf
RuleID : 27042-community - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit plugin detection connection jovf
RuleID : 27042 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit plugin detection connection jlnp
RuleID : 27041-community - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit plugin detection connection jlnp
RuleID : 27041 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit plugin detection connection jorg
RuleID : 27040-community - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit plugin detection connection jorg
RuleID : 27040 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Impact/Stamp exploit kit landing page
RuleID : 26600 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Impact/Stamp exploit kit landing page
RuleID : 26599 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Sakura exploit kit pdf download detection
RuleID : 26539 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Sakura exploit kit landing page received
RuleID : 26538 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Sakura exploit kit jar download detection
RuleID : 26537 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Stamp exploit kit landing page
RuleID : 26536 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit landing page - specific structure
RuleID : 26535 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - info.dll
RuleID : 26508 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit jar file downloaded
RuleID : 26434 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Nuclear exploit kit landing page
RuleID : 26343 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Nuclear exploit kit landing page - specific structure
RuleID : 26342 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Nuclear exploit kit landing page
RuleID : 26341 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page retrieval - ff.php
RuleID : 26339 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10IFRAMEr injection detection - leads to exploit kit
RuleID : 26338 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page - specific structure
RuleID : 26337 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit redirection page
RuleID : 26297 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit landing page
RuleID : 26296 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Watering Hole Campaign applet download
RuleID : 26295 - Revision : 3 - Type : FILE-OTHER
2014-01-10Blackhole exploit kit landing page
RuleID : 26253 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page retrieval
RuleID : 26227 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Crimeboss exploit kit redirection attempt
RuleID : 26226 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Oracle Java Gmbal package sandbox breach attempt
RuleID : 26186 - Revision : 4 - Type : FILE-JAVA
2014-01-10Oracle Java Gmbal package sandbox breach attempt
RuleID : 26185 - Revision : 5 - Type : FILE-JAVA
2014-01-10Styx exploit kit landing page
RuleID : 26090 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Gong Da exploit kit redirection page received
RuleID : 26013 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Whitehole exploit kit landing page
RuleID : 25806 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Whitehole exploit kit Java exploit retrieval
RuleID : 25805 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Whitehole exploit kit malicious jar download attempt
RuleID : 25804 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit 32-alpha jar request
RuleID : 25798 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit redirection successful
RuleID : 25611 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page
RuleID : 25569 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page retrieval
RuleID : 25568 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Multiple Exploit Kit Payload detection - setup.exe
RuleID : 25526 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Oracle Java Rhino script engine remote code execution attempt
RuleID : 25392 - Revision : 5 - Type : FILE-JAVA
2014-01-10Sweet Orange exploit kit obfuscated payload download
RuleID : 25391 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Sweet Orange exploit kit landing page - specific structure
RuleID : 25390 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Sweet Orange exploit kit landing page - specific structure
RuleID : 25389 - Revision : 1 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit redirection successful
RuleID : 25388 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - readme.exe
RuleID : 25387 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - about.exe
RuleID : 25386 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - calc.exe
RuleID : 25385 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - contacts.exe
RuleID : 25384 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit Payload detection - info.exe
RuleID : 25383 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Multiple exploit kit malicious jar file dropped
RuleID : 25382 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit portable executable download request
RuleID : 25140 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit eot outbound connection
RuleID : 25139 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit pdf outbound connection
RuleID : 25138 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit jar outbound connection
RuleID : 25137 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Styx exploit kit plugin detection connection
RuleID : 25136 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Styx Exploit Kit outbound connection
RuleID : 25135 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Sweet Orange exploit kit landing page - specific structure
RuleID : 25044 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit url structure detected
RuleID : 25043 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Oracle Java Applet remote code execution attempt
RuleID : 24993 - Revision : 5 - Type : FILE-JAVA
2014-01-10Nuclear exploit kit landing page detected
RuleID : 24888 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Sweet Orange exploit kit landing page - JAR redirection
RuleID : 24840 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Sweet Orange exploit kit landing page - specific structure
RuleID : 24839 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Sweet Orange User-Agent - contype
RuleID : 24838 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Sweet Orange initial landing page
RuleID : 24837 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10KaiXin exploit kit Java Class download
RuleID : 24793 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10KaiXin exploit kit attack vector attempt
RuleID : 24670 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10KaiXin exploit kit attack vector attempt
RuleID : 24669 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10KaiXin exploit kit attack vector attempt
RuleID : 24668 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10KaiXin exploit kit attack vector attempt
RuleID : 24667 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit redirection successful
RuleID : 24638 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit redirection page - specific structure
RuleID : 24637 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit redirection page - specific structure
RuleID : 24636 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page download attempt
RuleID : 24608 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page received - specific structure
RuleID : 24593 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page download attempt
RuleID : 24548 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page download attempt
RuleID : 24547 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page download attempt
RuleID : 24546 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackhole admin page outbound access attempt
RuleID : 24544 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Blackhole admin page inbound access attempt
RuleID : 24543 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit fallback executable download
RuleID : 24501 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole - Cookie Set
RuleID : 24475 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Crimeboss exploit kit outbound connection
RuleID : 24234 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Crimeboss exploit kit outbound connection
RuleID : 24233 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Crimeboss exploit kit outbound connection
RuleID : 24232 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Crimeboss exploit kit redirection attempt
RuleID : 24231 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page Received
RuleID : 24228 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 - URI Structure
RuleID : 24227 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Blackholev2 exploit kit landing page received
RuleID : 24226 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackhole possible email Landing to 8 chr folder
RuleID : 24171 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure
RuleID : 24054 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure
RuleID : 24053 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - fewbgazr catch
RuleID : 23962 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - hwehes
RuleID : 23850 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole redirection attempt
RuleID : 23849 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole redirection attempt
RuleID : 23848 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole redirection page
RuleID : 23797 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - Math.round catch
RuleID : 23786 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - Math.floor catch
RuleID : 23785 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page
RuleID : 23781 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page request - tkr
RuleID : 23622 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - prototype catch ...
RuleID : 23619 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page download attempt
RuleID : 23159 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - prototype catch
RuleID : 23158 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Nuclear Pack exploit kit binary download
RuleID : 23157 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Nuclear Pack exploit kit landing page
RuleID : 23156 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Oracle Java Rhino script engine remote code execution attempt
RuleID : 23008 - Revision : 6 - Type : FILE-JAVA
2014-01-10Blackhole redirection attempt
RuleID : 22949 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole Exploit Kit javascript service method
RuleID : 22088 - Revision : 12 - Type : EXPLOIT-KIT
2014-01-10Blackhole landing redirection page
RuleID : 22041 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackhole suspected landing page
RuleID : 22040 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole suspected landing page
RuleID : 22039 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit landing page with specific structure - Loading
RuleID : 21876 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Possible exploit kit post compromise activity - taskkill
RuleID : 21875 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Possible exploit kit post compromise activity - StrReverse
RuleID : 21874 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Phoenix exploit kit post-compromise behavior
RuleID : 21860 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Java exploit kit iframe drive by attempt
RuleID : 21668 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - catch
RuleID : 21661 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page Requested - /Index/index.php
RuleID : 21660 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page Requested - /Home/index.php
RuleID : 21659 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page
RuleID : 21658 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page - specific structure
RuleID : 21657 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - prototype catch
RuleID : 21646-community - Revision : 14 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - prototype catch
RuleID : 21646 - Revision : 14 - Type : EXPLOIT-KIT
2014-01-10Phoenix exploit kit landing page
RuleID : 21640 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - BBB
RuleID : 21581 - Revision : 8 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific header
RuleID : 21549 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific header
RuleID : 21539 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Sakura exploit kit rhino jar request
RuleID : 21509 - Revision : 2 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - prototype catch
RuleID : 21492-community - Revision : 20 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page with specific structure - prototype catch
RuleID : 21492 - Revision : 20 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit JavaScript carat string splitting with hostile applet
RuleID : 21438-community - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit JavaScript carat string splitting with hostile applet
RuleID : 21438 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit URL - search.php?page=
RuleID : 21348 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit URL - .php?page=
RuleID : 21347 - Revision : 10 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit malicious jar download
RuleID : 21346 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit malicious jar request
RuleID : 21345 - Revision : 7 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit pdf download
RuleID : 21344 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit pdf request
RuleID : 21343 - Revision : 6 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit response
RuleID : 21259 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit control panel access
RuleID : 21141 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Eleanore exploit kit post-exploit page request
RuleID : 21071 - Revision : 4 - Type : EXPLOIT-KIT
2014-01-10Eleanore exploit kit pdf exploit page request
RuleID : 21070 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Eleanore exploit kit exploit fetch request
RuleID : 21069 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Eleanore exploit kit landing page
RuleID : 21068 - Revision : 3 - Type : EXPLOIT-KIT
2014-01-10Java Applet Rhino script engine remote code execution attempt
RuleID : 21057 - Revision : 6 - Type : FILE-OTHER
2014-01-10Blackhole exploit kit landing page
RuleID : 21045 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit landing page
RuleID : 21044 - Revision : 5 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit post-compromise download attempt - .php?e=
RuleID : 21043 - Revision : 9 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit post-compromise download attempt - .php?f=
RuleID : 21042 - Revision : 10 - Type : EXPLOIT-KIT
2014-01-10Blackhole exploit kit URL - main.php?page=
RuleID : 21041 - Revision : 11 - Type : EXPLOIT-KIT
2014-01-10Yang Pack yg.htm landing page
RuleID : 21006 - Revision : 4 - Type : MALWARE-CNC
2014-01-10Oracle Java Applet Rhino script engine remote code execution attempt
RuleID : 20831 - Revision : 10 - Type : FILE-JAVA
2014-01-10Oracle Java Applet remote code execution attempt
RuleID : 20622 - Revision : 12 - Type : FILE-JAVA
2014-01-10SSL CBC encryption mode weakness brute force attempt
RuleID : 20212 - Revision : 7 - Type : SERVER-OTHER

Metasploit Database

idDescription
2011-10-18 Java Applet Rhino Script Engine Remote Code Execution

Nessus® Vulnerability Scanner

DateDescription
2014-06-30Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201406-32.nasl - Type : ACT_GATHER_INFO
2014-06-13Name : The remote openSUSE host is missing a security update.
File : suse_11_4_nss-201112-111220.nasl - Type : ACT_GATHER_INFO
2014-06-13Name : The remote openSUSE host is missing a security update.
File : suse_11_4_opera-110906.nasl - Type : ACT_GATHER_INFO
2014-06-13Name : The remote openSUSE host is missing a security update.
File : openSUSE-2011-100.nasl - Type : ACT_GATHER_INFO
2014-06-13Name : The remote openSUSE host is missing a security update.
File : suse_11_3_java-1_6_0-openjdk-111025.nasl - Type : ACT_GATHER_INFO
2014-06-13Name : The remote openSUSE host is missing a security update.
File : openSUSE-2012-76.nasl - Type : ACT_GATHER_INFO
2014-06-13Name : The remote openSUSE host is missing a security update.
File : suse_11_4_curl-120124.nasl - Type : ACT_GATHER_INFO
2014-06-13Name : The remote openSUSE host is missing a security update.
File : suse_11_3_java-1_6_0-sun-111024.nasl - Type : ACT_GATHER_INFO
2014-06-13Name : The remote openSUSE host is missing a security update.
File : suse_11_4_java-1_6_0-openjdk-111025.nasl - Type : ACT_GATHER_INFO
2014-06-13Name : The remote openSUSE host is missing a security update.
File : suse_11_4_java-1_6_0-sun-111024.nasl - Type : ACT_GATHER_INFO
2014-06-13Name : The remote openSUSE host is missing a security update.
File : openSUSE-2012-302.nasl - Type : ACT_GATHER_INFO
2014-06-13Name : The remote openSUSE host is missing a security update.
File : suse_11_3_nss-201112-111220.nasl - Type : ACT_GATHER_INFO
2014-06-13Name : The remote openSUSE host is missing a security update.
File : suse_11_3_opera-110906.nasl - Type : ACT_GATHER_INFO
2014-02-25Name : The remote host is missing a Mac OS X update that fixes several security issues.
File : macosx_SecUpd2014-001.nasl - Type : ACT_GATHER_INFO
2014-02-07Name : The remote mail server is affected by file disclosure and corruption vulnerab...
File : kerio_connect_810.nasl - Type : ACT_GATHER_INFO
2013-10-23Name : The remote host is missing a Mac OS X update that fixes several security issues.
File : macosx_10_9.nasl - Type : ACT_GATHER_INFO
2013-10-16Name : The remote database server is affected by multiple vulnerabilities.
File : oracle_rdbms_cpu_oct_2013.nasl - Type : ACT_GATHER_INFO
2013-09-04Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2012-80.nasl - Type : ACT_GATHER_INFO
2013-09-04Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2012-81.nasl - Type : ACT_GATHER_INFO
2013-09-04Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2011-10.nasl - Type : ACT_GATHER_INFO
2013-07-23Name : The remote web server is affected by multiple vulnerabilities.
File : hpsmh_7_2_1_0.nasl - Type : ACT_GATHER_INFO
2013-07-12Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2012-1088.nasl - Type : ACT_GATHER_INFO
2013-07-12Name : The remote Oracle Linux host is missing a security update.
File : oraclelinux_ELSA-2012-1089.nasl - Type : ACT_GATHER_INFO
2013-07-12Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2011-1380.nasl - Type : ACT_GATHER_INFO
2013-07-10Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_libcurl4-8618.nasl - Type : ACT_GATHER_INFO
2013-04-20Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2013-037.nasl - Type : ACT_GATHER_INFO
2013-02-22Name : The remote Unix host contains a programming platform that is affected by mult...
File : oracle_java_cpu_oct_2011_unix.nasl - Type : ACT_GATHER_INFO
2013-01-08Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201301-01.nasl - Type : ACT_GATHER_INFO
2012-11-16Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-1467.nasl - Type : ACT_GATHER_INFO
2012-09-20Name : The remote host is missing a Mac OS X update that fixes several security issues.
File : macosx_10_7_5.nasl - Type : ACT_GATHER_INFO
2012-09-20Name : The remote host is missing a Mac OS X update that fixes several security issues.
File : macosx_SecUpd2012-004.nasl - Type : ACT_GATHER_INFO
2012-09-06Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2012-097.nasl - Type : ACT_GATHER_INFO
2012-09-06Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2012-149.nasl - Type : ACT_GATHER_INFO
2012-08-30Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_18ce9a90f26911e1be53080027ef73ec.nasl - Type : ACT_GATHER_INFO
2012-08-03Name : The remote host has an application installed that is affected by multiple vul...
File : macosx_xcode_4_4.nasl - Type : ACT_GATHER_INFO
2012-08-01Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20120717_firefox_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-08-01Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20120717_thunderbird_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-08-01Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20111018_java_1_6_0_openjdk_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-08-01Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20111019_java_1_6_0_sun_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2012-07-18Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-1088.nasl - Type : ACT_GATHER_INFO
2012-07-18Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-1089.nasl - Type : ACT_GATHER_INFO
2012-07-18Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2012-1088.nasl - Type : ACT_GATHER_INFO
2012-07-18Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2012-1089.nasl - Type : ACT_GATHER_INFO
2012-06-21Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2012-096.nasl - Type : ACT_GATHER_INFO
2012-06-20Name : The remote Fedora host is missing a security update.
File : fedora_2012-9135.nasl - Type : ACT_GATHER_INFO
2012-06-15Name : The remote Windows host contains software that is affected by multiple vulner...
File : hp_systems_insight_manager_700_multiple_vulns.nasl - Type : ACT_GATHER_INFO
2012-05-10Name : The remote host is missing a Mac OS X update that fixes several security issues.
File : macosx_10_7_4.nasl - Type : ACT_GATHER_INFO
2012-05-10Name : The remote host is missing a Mac OS X update that fixes several security issues.
File : macosx_SecUpd2012-002.nasl - Type : ACT_GATHER_INFO
2012-05-07Name : The remote Fedora host is missing a security update.
File : fedora_2012-5785.nasl - Type : ACT_GATHER_INFO
2012-05-07Name : The remote Fedora host is missing one or more security updates.
File : fedora_2012-5924.nasl - Type : ACT_GATHER_INFO
2012-05-04Name : The remote Fedora host is missing a security update.
File : fedora_2012-5916.nasl - Type : ACT_GATHER_INFO
2012-05-02Name : The remote Fedora host is missing one or more security updates.
File : fedora_2012-5892.nasl - Type : ACT_GATHER_INFO
2012-04-27Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_python-8080.nasl - Type : ACT_GATHER_INFO
2012-04-24Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-0508.nasl - Type : ACT_GATHER_INFO
2012-04-16Name : It may be possible to obtain sensitive information from the remote host with ...
File : ssl3_tls1_iv_impl_info_disclosure.nasl - Type : ACT_GATHER_INFO
2012-04-16Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2012-058.nasl - Type : ACT_GATHER_INFO
2012-03-16Name : The remote VMware ESXi / ESX host is missing one or more security-related pat...
File : vmware_VMSA-2012-0005.nasl - Type : ACT_GATHER_INFO
2012-03-09Name : The remote VMware ESX host is missing a security-related patch.
File : vmware_VMSA-2012-0003.nasl - Type : ACT_GATHER_INFO
2012-03-06Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201203-02.nasl - Type : ACT_GATHER_INFO
2012-02-29Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_java-1_6_0-ibm-120223.nasl - Type : ACT_GATHER_INFO
2012-02-24Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_java-1_4_2-ibm-120105.nasl - Type : ACT_GATHER_INFO
2012-02-02Name : The remote host is missing a Mac OS X update that fixes several security issues.
File : macosx_10_7_3.nasl - Type : ACT_GATHER_INFO
2012-02-02Name : The remote host is missing a Mac OS X update that fixes several security issues.
File : macosx_SecUpd2012-001.nasl - Type : ACT_GATHER_INFO
2012-01-31Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2398.nasl - Type : ACT_GATHER_INFO
2012-01-25Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1263-2.nasl - Type : ACT_GATHER_INFO
2012-01-25Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_java-1_4_2-ibm-7908.nasl - Type : ACT_GATHER_INFO
2012-01-24Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_java-1_6_0-ibm-7926.nasl - Type : ACT_GATHER_INFO
2012-01-23Name : The remote Fedora host is missing one or more security updates.
File : fedora_2011-17399.nasl - Type : ACT_GATHER_INFO
2012-01-19Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-0034.nasl - Type : ACT_GATHER_INFO
2012-01-12Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2358.nasl - Type : ACT_GATHER_INFO
2012-01-12Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2368.nasl - Type : ACT_GATHER_INFO
2012-01-10Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2012-0006.nasl - Type : ACT_GATHER_INFO
2012-01-10Name : It may be possibe to obtain sensitive information from the remote Windows hos...
File : smb_nt_ms12-006.nasl - Type : ACT_GATHER_INFO
2011-12-23Name : The remote Fedora host is missing one or more security updates.
File : fedora_2011-17400.nasl - Type : ACT_GATHER_INFO
2011-12-14Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_a4a809d825c811e1b53100215c6a37bb.nasl - Type : ACT_GATHER_INFO
2011-12-13Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_mozilla-nss-7842.nasl - Type : ACT_GATHER_INFO
2011-12-13Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_java-1_5_0-ibm-7862.nasl - Type : ACT_GATHER_INFO
2011-12-07Name : The remote host contains a web browser that is potentially affected by multip...
File : opera_1160.nasl - Type : ACT_GATHER_INFO
2011-12-02Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2356.nasl - Type : ACT_GATHER_INFO
2011-11-26Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-1478.nasl - Type : ACT_GATHER_INFO
2011-11-17Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-1263-1.nasl - Type : ACT_GATHER_INFO
2011-11-14Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2011-170.nasl - Type : ACT_GATHER_INFO
2011-11-14Name : The remote Fedora host is missing a security update.
File : fedora_2011-15555.nasl - Type : ACT_GATHER_INFO
2011-11-09Name : The remote host has a version of Java that is affected by multiple vulnerabil...
File : macosx_java_10_6_update6.nasl - Type : ACT_GATHER_INFO
2011-11-09Name : The remote host has a version of Java that is affected by multiple vulnerabil...
File : macosx_java_10_7_update1.nasl - Type : ACT_GATHER_INFO
2011-11-07Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201111-02.nasl - Type : ACT_GATHER_INFO
2011-11-07Name : The remote Fedora host is missing a security update.
File : fedora_2011-15020.nasl - Type : ACT_GATHER_INFO
2011-10-20Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2011-1380.nasl - Type : ACT_GATHER_INFO
2011-10-20Name : The remote Windows host contains a programming platform that is affected by m...
File : oracle_java_cpu_oct_2011.nasl - Type : ACT_GATHER_INFO
2011-10-20Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-1384.nasl - Type : ACT_GATHER_INFO
2011-10-19Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-1380.nasl - Type : ACT_GATHER_INFO
2011-09-01Name : The remote host contains a web browser that is affected by multiple vulnerabi...
File : opera_1151.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2014-02-17 11:30:37
  • Multiple Updates